<p>McAfee AVERT Reports New Bagle Virus In-the-Wild</p><p>SYDNEY, July 6, 2004 —McAfee, the leading provider of intrusion prevention solutions, today announced that McAfee AVERT (Anti-virus and Vulnerability Emergency Response Team), the world-class research division of McAfee, raised the risk assessment to medium on the recently discovered W32/Bagle.ad@MM, also known as Bagle.ad. This new variant is a mass-mailing worm that is packed using UPX and comes in the form of a password-protected .ZIP file, with the password included in the message body as plaintext or within an image. To date, McAfee AVERT has received numerous reports of the virus being stopped or infecting users from the field—with most of the reports arriving from Japan, Australia, Germany and the UK. The samples received by McAfee AVERT have been from users versus the virus, which is similar to other Bagle reports.</p><p>Symptoms</p><p>The Bagle.ad worm is a mass mailing threat that harvests addresses from local files and then uses the harvested addresses in the ‘From’ field to send itself. Once activated, the worm copies itself to folders in the System Directory that have the phrase “shar” in the name, such as common peer-to-peer applications, and adds a registry key to the system start-up. The worm then proceeds into the remote access component of the virus, which listens to TCP port 1234 for remote connections. Users should be very weary and should most likely delete any email containing the following:</p><p>From: (address is spoofed)</p><p>Subject:</p><p>• Re: Msg reply</p><p>• Re: Hello</p><p>• Re: Yahoo!</p><p>• Re: Thank you!</p><p>• Re: Thanks :)</p><p>• RE: Text message</p><p>• Re: Document</p><p>• Incoming message</p><p>• Re: Incoming Message</p><p>• RE: Incoming Msg</p><p>• RE: Message Notify</p><p>• Notification</p><p>• Changes..</p><p>• Update</p><p>• Fax Message</p><p>• Protected message</p><p>• RE: Protected message</p><p>• Forum notify</p><p>• Site changes</p><p>• Re: Hi</p><p>• Encrypted document,0</p><p>Body Text:</p><p>• Various message bodies are used and in some cases contain the password for an encrypted attachment, either in plaintext or within an image.</p><p>Pathology</p><p>After being executed, Bagle.ad emails itself to addresses found on the infected host as a password protected .ZIP file with the password included in the message body. The virus listens on TCP port for remote connections. It attempts to notify the author that the infected system is ready to accept commands, by contacting various Web sites and calling a PHP script on the remote sites. After January 25, 2005, this component of the worm will be deactivated. The worm also carries its source code (assembler) in its body, encrypted. When mass-mailing itself, the worm may also include a copy of the source code within a ZIP archive—making it likely that there could be additional trivial variants based on this source.</p><p>Cure</p><p>Immediate information and cure for this worm can be found online at the McAfee AVERT site located at http://vil.nai.com/vil/content/v_126562.htm. McAfee AVERT is advising its customers to update to the 4373 DATs to stay protected from all the current Bagle threats.</p><p>McAfee AVERT Labs is one of the top-ranked anti-virus and vulnerability research organizations in the world, employing researchers in offices on five continents. McAfee AVERT protects customers by developing and providing solutions that are created through the combined efforts of McAfee AVERT researchers and McAfee AVERT AutoImmune technology, which applies advanced heuristics, generic detection and ActiveDAT technology to generate cures for previously undiscovered viruses.</p><p>About McAfee, Inc.</p><p>With headquarters in Santa Clara, Calif., McAfee, Inc. (NYSE: MFE) creates best-of-breed computer security solutions that prevent intrusions on networks and protect computer systems from the next generation of blended attacks and threats. McAfee’s customers span large enterprises, governments, small and medium sized businesses, and consumers. For more information, McAfee, Inc. can be reached on the Internet at http://www.mcafee.com/.</p><p>-ends-</p><p>NOTE: McAfee and AVERT are either registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the United States and/or other countries. All other registered and unregistered trademarks herein are the sole property of their respective owners. *2004 McAfee, Inc. All Rights Reserved.</p><p>For further information please contact:</p><p>Natalie Connor</p><p>Tel: +61 (0)2 9956 5733</p><p>Mobile: +61 (0)417 259 054</p><p>E-mail: natalie.connor@text100.com.au</p>

Copyright 2018 IDG Communications. ABN 14 001 592 650. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission of IDG Communications is prohibited.